- Top of Page
This invention relates in general to wireless networking and more particularly, to a system and method for reducing overhead in a wireless network.
- Top of Page
Wireless radio frequency spectrum is a precious and scarce resource for wireless operators in any wireless system. Accordingly, efficient usage of the spectrum is always desired for wireless operators. In particular, Medium Access Control (MAC) overhead efficiency is a key factor to achieve spectrum efficiency. MAC overhead in wireless systems includes packet headers, control and management packets, security context, message authentication code, etc. Reducing MAC overheads as much as possible can significantly improve MAC efficiency and thus conserve wireless resources.
- Top of Page
In accordance with particular embodiments, a method for reducing overhead includes concatenating a plurality of packets into a single jumbo packet. Each packet of the plurality of packets comprises a header. The method also includes identifying a base header from among the plurality of headers. The method further includes determining a plurality of hamming distances. Each hamming distance is associated with a respective packet of the plurality of packets other than the base header. The hamming distance is indicative of a number of differences between the respective header and another header of the plurality of headers. The method further includes determining a plurality of encoded values. Each encoded value is associated with a respective packet of the plurality of packets other than the base header and determined based on a difference between the respective header and at least one other header. The method additionally includes generating a jumbo header comprising the base header, the plurality of hamming distances, and the plurality of encoded values. The method also includes transmitting the jumbo packet with the jumbo header via a wireless connection.
In accordance with some embodiments, a method for reducing overhead includes receiving, via a wireless connection, a jumbo packet comprising a jumbo header and a plurality of concatenated packets. The method also includes identifying within the jumbo header, a base header associated with one packet of the plurality of packets and at least one hamming distance and at least one encoded value associated with each packet of the plurality of packets other than the identified packet. The method additionally includes recreating a plurality of headers associated with the plurality of packets based on the base header and the respective hamming distance and encoded value.
Technical advantages of particular embodiments may include providing a reduction in the amount of header overhead involved in communicating packets in a wireless network. The reduction may be achieved while still allowing the recipient to receive all of the information in the original header. Accordingly, the wireless network's resources are more efficiently used.
Other technical advantages will be readily apparent to one skilled in the art from the following figures, descriptions and claims. Moreover, while specific advantages have been enumerated above, various embodiments may include all, some or none of the enumerated advantages.
BRIEF DESCRIPTION OF THE DRAWINGS
- Top of Page
For a more complete understanding of particular embodiments and their advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
FIG. 1 illustrates a communication system comprising various communication networks, in accordance with particular embodiments;
FIG. 2 illustrates a wireless network comprising a more detailed view of an endpoint and a base station, in accordance with particular embodiments;
FIG. 3 illustrates the concatenation of several packets into a single jumbo packet having less overhead than the original packets, in accordance with particular embodiments; and
FIG. 4 illustrates a method for reducing overhead in a wireless network, in accordance with a particular embodiment.
- Top of Page
FIG. 1 illustrates a communication system comprising various communication networks, in accordance with particular embodiments. Communication system 100 may be comprised of multiple interconnected networks 110. Each network 110 may be any of a variety of communication networks designed to facilitate one or more different services either independently or in conjunction with other networks. For example, networks 110 may facilitate internet access, online gaming, file sharing, peer-to-peer file sharing (P2P), voice over internet protocol (VoIP) calls, video over IP calls, or any other type of functionality typically provided by a network. Networks 110 may provide their respective services using any of a variety of protocols for either wired or wireless communication. For example, network 110a may comprise an 802.16 wireless network (e.g., 802.16j or 802.16m), popularly known as WiMAX, which may include base stations, such as base station 120, and relay stations, such as relay stations 130. Network 110a may provide for the use of relay stations 130 by implementing 802.16j. A WiMAX network that uses relay stations may be referred to as a mobile multi-hop relay (MMR) network.
Within a network using a wireless protocol (e.g., 802.16m), such as network 110a, communications between components may be done with packets. Besides the data to be communicated, these packets may include MAC overhead. The overhead may include headers containing information related to the packet (e.g., the source, the destination, the size of the payload, etc.) as well as security information (e.g., message authentication code, security context, etc.). This information can create significant overhead because it is contained in each packet but does not directly contribute to the communication of actual desired data or information. While the information may cause overhead, it may be needed to provide the packets with integrity protection and encryption from potential security attacks and eavesdropping. In particular embodiments, the overhead may be reduced by concatenating two or more packets into a single jumbo packet and then compressing the header and/or reducing the amount of security information used for the concatenated packets.
The packets (and jumbo packets) may be communicated between components of wireless network 110a via wireless links. More specifically, between each endpoint, relay station and/or base station there may be a wireless connection or link, such as wireless connections 150. Wireless connections 150 may each comprise their own various wireless resources such as, for example, a combination of a particular center frequency, a particular bandwidth, a particular time slot, and/or a particular subchannel (for example, as described in a downlink or uplink map). The actual properties of a particular wireless connection 150 may depend on the communication standard used (e.g., WiMAX).
In wireless network 110a, MAC overhead may include packet headers, control and management packets, security information, etc. For simplicity, the term security information may be used as a general term for the mechanism or mechanisms that may be employed to protect (e.g., authentication) a packet payload. For example, in 802.16 systems, Ciphertext message authentication code (CMAC) values for data packets or CMAC tuples/CMAC digests for MAC management messages may be considered as security information. Another example of the security information is the authentication header in IPSec.
Although communication system 100 includes four different networks, networks 110a-110d, the term “network” should be interpreted as generally defining any network or combination of networks capable of transmitting signals, data, and/or messages, including signals, data or messages transmitted through WebPages, e-mail, text chat, voice over IP (VoIP), and instant messaging. Depending on the scope, size and/or configuration of the network, any one of networks 110a-110d may be implemented as a LAN, WAN, MAN, PSTN, WiMAX network, globally distributed network such as the Internet, Intranet, Extranet, or any other form of wireless or wired networking. For purposes of illustration and simplicity, network 110a is a MAN that may be implemented, at least in part, via WiMAX, network 110b is a PSTN, network 110c is a LAN, and network 110d is a WAN.
In the depicted embodiment, networks 110a, 110c and 110d may be IP networks. IP networks transmit data by placing the data in packets and sending each packet individually to the selected destination, along one or more communication paths. Network 110b may, for example, be a PSTN that may include switching stations, central offices, mobile telephone switching offices, pager switching offices, remote terminals, and other related telecommunications equipment that are located throughout the world. Network 110d may be coupled to network 110b through a gateway. Depending on the embodiment, the gateway may be a part of network 110b or 110d (e.g., nodes 170e or 170c may comprise a gateway). The gateway may allow PSTN 110b to be able to communicate with non-PSTN networks such as networks 110a, 110c and 110d.
Networks 110 may be connected to each other and with other networks via a plurality of wired links 160, wireless connections 150, and nodes 170. Not only do the wired links 160, wireless connections 150, and nodes 170 connect various networks but they also interconnect endpoints 140 with one another and with any other components coupled to or a part of any of networks 110. The interconnection of networks 110a-110d may enable endpoints 140 to communicate data and control signaling between each other as well as allowing any intermediary components or devices to communicate data and control signals. Accordingly, users of endpoints 140, may be able to send and receive data and control signals between and among each network component coupled to one or more of networks 110a-110d.
Nodes 170 may include any combination of network components, session border controllers, gatekeepers, base stations, conference bridges, routers, hubs, switches, gateways, endpoints, or any other hardware, software, or embedded logic implementing any number of communication protocols that allow for the exchange of packets in communication system 100. For example, node 170e may comprise a gateway. Node 170e, as a gateway, may translate communications between the various protocols used by different networks.
Endpoints 140 and/or nodes 170 may provide data or network services to a user through any combination of hardware, software embedded in a computer readable medium, and/or encoded logic incorporated in hardware or otherwise stored (e.g., firmware). For example, endpoints 140a-140d may include a cell phone, an IP telephone, a computer, a video monitor, a camera, a personal data assistant or any other hardware, embedded software and/or encoded logic that supports the communication of packets (or frames) using networks 110. Endpoints 140 may also include unattended or automated systems, gateways, other intermediate components or other devices that can send or receive data and/or signals.
Although FIG. 1 illustrates a particular number and configuration of endpoints, connections, links, and nodes, communication system 100 contemplates any number or arrangement of such components for communicating data. In addition, elements of communication system 100 may include components centrally located (local) with respect to one another or distributed throughout communication system 100.
FIG. 2 illustrates a wireless network comprising a more detailed view of an endpoint and a base station, in accordance with particular embodiments. The depicted embodiment is a simplified network comprising IP network 205, base station 210, and endpoint 270. In different embodiments network 200 may comprise any number of wired or wireless networks, base stations, endpoints, and/or any other components (e.g., relay stations) that may facilitate or participate in the communication of data and/or signals whether via wired or wireless connections.
In the depicted embodiment, base station 210 comprises processor 212, memory 214, interface 216, radio 217 and antenna 218. Similarly, endpoint 270 comprises processor 272, memory module 274, radio 277, and antenna 278. These components may work together in order to provide wireless networking functionality, such as communicating packets using less overhead than a traditional wireless network.
Looking at the various components of network 200 in more detail, IP network 205 may comprise one or more of the networks 110 described above with respect to FIG. 1. For example, IP network 205 may comprise the Internet, a LAN, WAN, MAN, PSTN or some combination of the above.
For convenience, similar components of base station 210 and endpoint 270 will be discussed together where appropriate. Processors 212 and 272 may be microprocessors, controllers, or any other suitable computing devices, resources, or combinations of hardware, embedded software and/or encoded logic operable to provide, either alone or in conjunction with other components (e.g., memory 214 and/or 274), wireless networking functionality. Such functionality may include providing various wireless features discussed herein. For example, processors 212 and 272 may be able to determine which packets to concatenate, and how to compress the headers and reduce the amount of security information. Additional examples and functionality provided, at least in part, by processors 212 and 272 will be discussed below.
Memory modules 214 and 274 may be any form of volatile or non-volatile memory including, without limitation, magnetic media, optical media, random access memory (RAM), read-only memory (ROM), flash memory, removable media, or any other suitable local or remote memory component or components. Memory modules 214 and 274 may store any suitable data or information utilized by base station 210 and endpoint 270, respectively, including software embedded in a computer readable medium, and/or encoded logic incorporated in hardware or otherwise stored (e.g., firmware). For example, in particular embodiments memory modules 214 and 274 may store information regarding the cipher used as security for packets communicated between base station 210 and endpoint 270. Memory modules 214 and 274 may also maintain a list, database, or other organization of data useful for determining how to route data to the proper component.
Radios 217 and 277 may be coupled to or a part of antennas 218 and 278, respectively. Radios 217 and 277 may receive digital data that is to be sent out to other base stations, relay stations and/or endpoints via a wireless connection. Radios 217 and 277 may convert the digital data into a radio signal having the appropriate center frequency and bandwidth parameters. These parameters may have been determined ahead of time, for example by a combination of processor 212 and memory 214 of base station 210. The radio signal may then be transmitted via antennas 218 and 278 to the appropriate recipient. Similarly, radios 217 and 277 may convert radio signals received via antennas 218 and 278, respectively, into digital data to be processed by processors 212 or 272, as appropriate. Together, radio 217 and antenna 218, and radio 277 and antenna 278 may each form a wireless interface.